HADESS (@hadess_security) 's Twitter Profile
HADESS

@hadess_security

Cybersecurity Company that helps any team and developers to be fast and secure. #hadess #redteam #pentest #appsec #asm

ID: 1273237483724197891

linkhttps://hadess.io calendar_today17-06-2020 12:54:21

883 Tweet

3,3K Followers

0 Following

HADESS (@hadess_security) 's Twitter Profile Photo

Attacking OpenStack blog.devsecopsguides.com/attacking-open… Security attacks against OpenStack include SQL injection, XSS, and data exposure due to misconfiguration. Attacking CI/CD: x.com/Hadess_securit… #openstack #cloud #Infrastructure

Attacking OpenStack
blog.devsecopsguides.com/attacking-open…

Security attacks against OpenStack include SQL injection, XSS, and data exposure due to misconfiguration. 

Attacking CI/CD: x.com/Hadess_securit…

#openstack #cloud #Infrastructure
Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

RedTeam Story#1: XSS, LFI, Logrotate Credit: HADESS Blog: redteamrecipe.com/redteam-story-… Book: linkedin.com/posts/dailydar… #cybersecurity #infosec #redteam #cyberattack

RedTeam Story#1: XSS, LFI, Logrotate

Credit: <a href="/Hadess_security/">HADESS</a>

Blog: redteamrecipe.com/redteam-story-…

Book: linkedin.com/posts/dailydar…

#cybersecurity #infosec #redteam #cyberattack
HADESS (@hadess_security) 's Twitter Profile Photo

The Hacker’s Guide to LLMs 📝 Practical Use of LLMs in Bug Bounty Hunting hadess.io/practical-use-… 📝 Practical LLM attack scenarios hadess.io/practical-llm-… 📚 EBook hadess.io/the-hackers-gu… 👑 Security Researchers: Emad(Arganex) @mers4d Saeid Ghasemshirazi #llm #ai #owasp

The Hacker’s Guide to LLMs  

📝 Practical Use of LLMs in Bug Bounty Hunting hadess.io/practical-use-…

📝 Practical LLM attack scenarios hadess.io/practical-llm-…

📚 EBook
hadess.io/the-hackers-gu…

👑 Security Researchers:
<a href="/ArganexEmad/">Emad(Arganex)</a>
@mers4d
Saeid Ghasemshirazi

#llm #ai #owasp
HADESS (@hadess_security) 's Twitter Profile Photo

Attacking Nginx blog.devsecopsguides.com/attacking-nginx Other Series👇 x.com/Hadess_securit… #nginx #webserver #DevOps #devsecops

Attacking Nginx
blog.devsecopsguides.com/attacking-nginx

Other Series👇

x.com/Hadess_securit…

#nginx #webserver #DevOps #devsecops
HADESS (@hadess_security) 's Twitter Profile Photo

Cryptography for Hackers redteamrecipe.com/cryptography-f… from AES and RSA to Bcrypt and PGP. Dive into the technical details of how these methods secure your data. Tools: gchq.github.io dcode.fr/en #hashing #encryption #redteam #cryptography

Cryptography for Hackers
redteamrecipe.com/cryptography-f…

from AES and RSA to Bcrypt and PGP. Dive into the technical details of how these methods secure your data.

Tools:
gchq.github.io
dcode.fr/en

#hashing #encryption #redteam #cryptography
HADESS (@hadess_security) 's Twitter Profile Photo

Attacking pfSense blog.devsecopsguides.com/attacking-pfse… Secure your pfSense firewall by addressing common vulnerabilities and implementing best practices to prevent unauthorized access and attacks. Other Series👇 x.com/Hadess_securit… #pfsense #firewall #devops #devsecops

Attacking pfSense
blog.devsecopsguides.com/attacking-pfse…

Secure your pfSense firewall by addressing common vulnerabilities and implementing best practices to prevent unauthorized access and attacks.

Other Series👇 

x.com/Hadess_securit…

#pfsense #firewall #devops #devsecops
HADESS (@hadess_security) 's Twitter Profile Photo

OSINT Methods for Image Investigations redteamrecipe.com/osint-methods-… #redteam #osint #image #geospy #imgspy #investigation

OSINT Methods for Image Investigations
redteamrecipe.com/osint-methods-…

#redteam #osint #image #geospy #imgspy #investigation
Cyber Detective💙💛 (@cyb_detective) 's Twitter Profile Photo

Cryptography for Hackers 1 hour reading guide: Encryption and Decryption Popular Cryptographic Methods Hashing Difference Between Data-at-Rest and Data-in-Transit Finding the Cryptography Algorithm from Encrypted Text and more redteamrecipe.com/cryptography-f… Tip by HADESS

Cryptography for Hackers

1 hour reading guide:

Encryption and Decryption
Popular Cryptographic Methods
Hashing 
Difference Between Data-at-Rest and Data-in-Transit 
Finding the Cryptography Algorithm from Encrypted Text

and more
redteamrecipe.com/cryptography-f…
Tip by <a href="/Hadess_security/">HADESS</a>
HADESS (@hadess_security) 's Twitter Profile Photo

File Upload Vulnerabilities blog.devsecopsguides.com/file-upload-vu… File Content, Magic Byte, Config Overwrite, Insecure Handler, and public/private exploit in various file types such as java, png, XYZ, ... Other Series👇 Attacking pfSense: x.com/Hadess_securit… #fileupload #devsecops

HADESS (@hadess_security) 's Twitter Profile Photo

System Binary Proxy Execution 📝 Article: hadess.io/system-binary-… 📚 EBook: hadess.io/system-binary-… 👑 Security Researchers: Amir Gholizadeh (Arima), Surya Dev Singh (Surya Dev Singh) #microsoft #redteam #privilegeescalation #mitre #lolbin #windows #binary #execution

System Binary Proxy Execution  

📝 Article: hadess.io/system-binary-…

📚 EBook: hadess.io/system-binary-…

👑 Security Researchers: Amir Gholizadeh (<a href="/arimaqz/">Arima</a>), Surya Dev Singh (<a href="/kryolite_secure/">Surya Dev Singh</a>)

#microsoft #redteam #privilegeescalation #mitre #lolbin #windows #binary #execution
HADESS (@hadess_security) 's Twitter Profile Photo

Java RCE Scenarios blog.devsecopsguides.com/java-applicati… Common scenarios include deserialization of untrusted data, unsafe reflection, or injection flaws. Other Series👇 File Upload Vulnerabilities: x.com/Hadess_securit… #java #rce #json #yaml #devops #devsecops #appsec #bugbountytips

HADESS (@hadess_security) 's Twitter Profile Photo

SaaS Security Playbook redteamrecipe.com/saas-security-… SaaS attack techniques github.com/pushsecurity/s… The New SaaS Cyber Kill Chain youtube.com/watch?v=pdDzUT… #saas #redteam #mitre #playbook #blueteam #oauth #okta #mfa #attack #cloud

SaaS Security Playbook
redteamrecipe.com/saas-security-…

SaaS attack techniques
github.com/pushsecurity/s…

The New SaaS Cyber Kill Chain
youtube.com/watch?v=pdDzUT…

#saas #redteam #mitre #playbook #blueteam #oauth #okta #mfa #attack #cloud
HADESS (@hadess_security) 's Twitter Profile Photo

Payment Vulnerabilities blog.devsecopsguides.com/payment-vulner… Basic Double Spend, Amplified spend, Race Condition, DOS, IDOR, Response Manipulation... Other Series👇 Java RCE Scenarios: x.com/Hadess_securit… #payment #appsec #devops #devsecops #bugbountytips

Payment Vulnerabilities
blog.devsecopsguides.com/payment-vulner…

Basic Double Spend, Amplified spend, Race Condition, DOS, IDOR, Response Manipulation...

Other Series👇

Java RCE Scenarios: x.com/Hadess_securit…

#payment #appsec #devops #devsecops #bugbountytips
HADESS (@hadess_security) 's Twitter Profile Photo

Dark Web Kingpin Pompompurin Arrested: The Fall of BreachForums’ Infamous Administrator 📝 Article: hadess.io/pompompurin-ha… 📚 EBook: hadess.io/pompompurin-ha… 👑 Security Researchers: Sashwin K hadess.io/pompompurin-ha… #raidforum #breachforum #pompompurin #threatintelligence

Dark Web Kingpin Pompompurin Arrested: The Fall of BreachForums’ Infamous Administrator

📝 Article: hadess.io/pompompurin-ha…

📚 EBook: hadess.io/pompompurin-ha…

👑 Security Researchers: Sashwin K

hadess.io/pompompurin-ha…

#raidforum #breachforum #pompompurin #threatintelligence
HADESS (@hadess_security) 's Twitter Profile Photo

HTTP Security Header blog.devsecopsguides.com/http-security-… Other Series👇 Payment Vulnerabilities: x.com/Hadess_securit… #devops #devsecops #securityheader #cors #nginx #apache #vulnerabilities #appsec #bugbountytips

HTTP Security Header
blog.devsecopsguides.com/http-security-…

Other Series👇

Payment Vulnerabilities: x.com/Hadess_securit…

#devops #devsecops #securityheader #cors #nginx #apache 
#vulnerabilities #appsec #bugbountytips
HADESS (@hadess_security) 's Twitter Profile Photo

Resetting Hardware for Red Teamer redteamrecipe.com/resetting-hard… Imagine the intricate ballet of power cycles—five deliberate resets, each one a calculated step towards revealing a device’s most guarded secrets. Cheatsheet Repo: github.com/HadessCS/Hardw… #redteam #ics #iot #hardware

Resetting Hardware for Red Teamer
redteamrecipe.com/resetting-hard…

 Imagine the intricate ballet of power cycles—five deliberate resets, each one a calculated step towards revealing a device’s most guarded secrets. 
Cheatsheet Repo:
github.com/HadessCS/Hardw…

#redteam #ics #iot #hardware
HADESS (@hadess_security) 's Twitter Profile Photo

Attacking MongoDB blog.devsecopsguides.com/attacking-mong… Other Series👇 HTTP Security Header: x.com/Hadess_securit… #mongodb #devops #devsecops #database #nosql

Attacking MongoDB
blog.devsecopsguides.com/attacking-mong…

Other Series👇
HTTP Security Header: x.com/Hadess_securit…

#mongodb #devops #devsecops #database #nosql
HADESS (@hadess_security) 's Twitter Profile Photo

ROP Gadget Unleashed 📝 Article: hadess.io/rop-gadget-unl… 📚 EBook: hadess.io/rop-gadget-unl… 👑 Security Researchers: Amir Gholizadeh (Arima), Surya Dev Singh (Surya Dev Singh) #execution #cpp #c #rop #binary #reverseengineering #pwn #misc #ctf

ROP Gadget Unleashed

📝 Article: hadess.io/rop-gadget-unl…

📚 EBook: hadess.io/rop-gadget-unl…

👑 Security Researchers: Amir Gholizadeh (<a href="/arimaqz/">Arima</a>), Surya Dev Singh (<a href="/kryolite_secure/">Surya Dev Singh</a>)

#execution #cpp #c #rop #binary #reverseengineering #pwn #misc #ctf
HADESS (@hadess_security) 's Twitter Profile Photo

⭐ Awesome Secure Coding Labs C#: github.com/orgs/securec0d… Swift: github.com/orgs/securec0d… Java: github.com/orgs/securec0d… C++: github.com/orgs/securec0d… Go: github.com/orgs/securec0d… JS: github.com/orgs/securec0d… PHP: github.com/orgs/securec0d… Python: github.com/orgs/securec0d… #labs

⭐ Awesome Secure Coding Labs

C#:
github.com/orgs/securec0d…

Swift:
github.com/orgs/securec0d…

Java:
github.com/orgs/securec0d…

C++:
github.com/orgs/securec0d…

Go:
github.com/orgs/securec0d…

JS:
github.com/orgs/securec0d…

PHP:
github.com/orgs/securec0d…

Python:
github.com/orgs/securec0d…

#labs